September 29, 2025
The Fake Bureau of Investigation: How Cybercriminals Are Impersonating Government Pages-
Privacy & Compliance
Jun 17, 2020
Understanding the Relationship Between the GDPR and ePrivacy Directive
Remember last May when our favorite sites were suddenly asking our consent to collect cookie information? The answer given by the media and other experts for this flurry of cookie...
Michael Buckbee
4 min read
-
Data Security
Jun 17, 2020
How to Use Microsoft Teams Safely: Security and Compliance Basics
Microsoft Teams is the Office 365 chat portal. While it enhances productivity, it also introduces some risk — read on to learn how to reduce these risks
Michael Buckbee
6 min read
-
Data Security Privacy & Compliance
Jun 17, 2020
Right to be Forgotten: Explained
Learn about The Right to be Forgotten (RTBF), an individual’s right to request their data be removed from any organization's data stores.
Michael Buckbee
5 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part V: More DDE and COM Scriplets
In this series of post, we’ve been exploring attack techniques that involve minimal efforts on the part of hackers. With the lazy code-free approach I introduced last time, it’s even possible to...
Michael Buckbee
4 min read
-
Data Security
Jun 17, 2020
Adventures in Fileless Malware, Part I
When I first started looking into the topic of hackers living off the land by using available tools and software on the victim’s computer, little did I suspect that it would...
Michael Buckbee
4 min read
-
Data Security Privacy & Compliance
Jun 17, 2020
How to Discover GDPR Data With Varonis
GDPR goes into effect in less than 85 days – but there’s still time to prepare. The first step in getting ready for the upcoming deadline is to discover and...
Michael Buckbee
2 min read
-
Data Security
Jun 17, 2020
What is Identity Access Management?
Identity and access management is establishing and managing the roles and access privileges of individual network users.
Daniel Miller
6 min read
-
Data Security
Jun 17, 2020
Is Your Company Prepared for a Cyber Attack?
Would your company survive a cyber attack? Use our flowchart to see if your business is prepared for cybersecurity threats.
Rob Sobers
1 min read
-
Active Directory
Jun 17, 2020
Active Directory Has a Privacy Problem
Attackers can manipulate Active Directory into giving up potentially sensitive data about users on your network.
Michael Buckbee
3 min read
-
Privacy & Compliance
Jun 17, 2020
Frequently Asked Questions (FAQ): GDPR and HR/Employee Data
As I wrote in another post, HR records are considered personal data and covered under the General Data Protection Regulation (GDPR). Since I keep on hearing from people who should...
Michael Buckbee
6 min read
-
Data Security
Jun 17, 2020
Koadic: LoL Malware Meets Python-Based Command and Control (C2) Server, Part I
In my epic series on Windows binaries that have dual uses– talkin’ to you rundll32 and mshta — I showed how hackers can stealthy download and launch remote script-based malware....
Michael Buckbee
6 min read
-
Data Security
Jun 17, 2020
Endpoint Detection and Response (EDR): Everything You Need to Know
Endpoints are a favorite target of attackers – they’re everywhere, prone to security vulnerabilities, and difficult to defend. Our guide to EDR will take you through the basics, the importance and the 9 elements of EDR solutions. Check it out!
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital